Microsoft has released an update to address a critical remote code execution (RCE) vulnerability, dubbed 'SigRed', in Windows DNS servers.
When we adjust to our "new normal" after COVID-19, is your healthcare organization protected against the increasing threats facing your new business operations?
CyberMaxx™ has received SOC for Service Organizations (SOC 2, Type II) Certification for their managed cybersecurity services by Insyte CPAs, LLC, an independent service auditor. This certification illustrates CyberMaxx's constant dedication to its customers and commitment to providing trusted services on which healthcare organizations can rely.
CyberMaxx™ is honored to be named a Top Managed Security Service Provider (MSSP) to Watch in 2020 by Cybersecurity Ventures' CyberCrime Magazine.
Healthcare CIOs, CISOs, and cybersecurity teams can't allow COVID-19 to distract from phishing scams, ransomware, rogue insiders and medical device hacks aimed toward employees, patients and data.
Microsoft is warning that an exploit with the magnitude of the WannaCry attack that crippled computers worldwide two years ago could be imminent if people fail to patch a high-severity vulnerability.
Across the globe cybersecurity teams work around the clock to keep up with scanning and patching vulnerabilities, and identifying threats. This form of Vulnerability Risk Management is becoming a top priority within IT security teams.
As such, more and more risk personnel are reaching out to vendors of VRM to help with vulnerability management and the struggle to reduce security cyber risk. But do you really need a vulnerability risk management solution?
Identifying and utilizing cybersecurity best practices is infinitely more complicated than it was a few years ago. Between constant patch updates, attacks that have never been seen before, and new compliance mandates, there’s a lot to balance while managing security operations. So, how can you ensure that your company is keeping up with the latest in cybersecurity best practices?
Social engineering is an insidious – and highly successful – method of data theft. Training users to spot social engineering attacks is the key to beating them.